lesson title: history of rfid dale r. thompson computer science and computer engineering dept....

27
Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas http://rfidsecurity.uark.edu 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE-0736741. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008, 2009 by Dale R. Thompson {[email protected]}

Upload: abigayle-wade

Post on 11-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Lesson Title: History of RFID

Dale R. ThompsonComputer Science and Computer Engineering Dept.

University of Arkansas

http://rfidsecurity.uark.edu 1

This material is based upon work supported by the National Science Foundation under Grant No. DUE-0736741.

Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF).

Copyright © 2008, 2009 by Dale R. Thompson {[email protected]}

Page 2: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

RFID Definition• Radio frequency identification (RFID) is an enabling

technology that is an automatic identification method for retrieving and accessing data using devices called RFID tags, sometimes called transponders. The basic RFID system includes tags, readers, and associated interfaces. Its applications include item management, physical access control, travel documents, finance & banking, sensors, animal tracking, human identification, and product counterfeiting countermeasures.

http://rfidsecurity.uark.edu 2

Page 3: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Identify Friend or Foe (IFF)

• US and Britain had active beacons 1937-8• Aircraft identification system

– Transponders (tags) on airplanes today• When interrogate respond with 12 pulses• Link ID to other information• Location (altitude and distance)

– Interrogator (reader)• Pair of pulses at 1030 MHz in UHF band• Transmission of info from interrogator to transponder

– Expensive but planes are expensive

http://rfidsecurity.uark.edu 3

Page 4: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Economics of Identification

• The identification system must cost less than the object to which it is attached

• Large or expensive systems “tagged” first• Small object constraints

• Reduce size• Reduce complexity• Reduce cost

http://rfidsecurity.uark.edu 4

Page 5: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Low-cost tag requirements

• No transmitter• No battery• Simple circuit• Being heard in the noise

http://rfidsecurity.uark.edu 5

Page 6: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

No transmitter

• Backscattering communication

http://rfidsecurity.uark.edu 6

Page 7: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

No battery

• Harvest energy from radio frequency (RF)

http://rfidsecurity.uark.edu 7

Page 8: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Simple circuit

• Inductively coupled system like a transformer• Lower frequencies (125 kHz – 10 MHz)

http://rfidsecurity.uark.edu 8

Page 9: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Electronic Article Surveillance (EAS)

http://rfidsecurity.uark.edu 9

Page 10: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Electromagnetic EAS system

• Magnetic strip– Magnetize strip = deactivates– Demagnetize strip = activates tag

• Can be reactivated and used again• Transmit low frequency (70 Hz – 1kHz)– Strip detected by unique frequency pattern

http://rfidsecurity.uark.edu 10

Page 11: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Acousto-magnetic (AM) EAS system

• Transmit about 58 kHz in pulses• At end of pulse tag responds• Tag responds like a tuning fork• Demagnetize = deactivate tag• Magnetize = activates tag• Bias magnetic required

http://rfidsecurity.uark.edu 11

Page 12: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Radio frequency (RF) EAS system

• Operate 2 – 10 MHz• Transmitter sweeps a range of frequencies• Tags have diode or RC circuit with helical

antenna• Deactivate = strong RF burns out diode or RC

components

http://rfidsecurity.uark.edu 12

Page 13: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Passive RFID tag block diagram

http://rfidsecurity.uark.edu 13

Page 14: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Sample applications

• Rail industry in US (late 1980s)• Automobile identification (1990 in Oklahoma)• Livestock management (1996 standards)• Dept. of Defense (DoD) identify shipping

containers (1990s)• Smart payment cards (1990s)

http://rfidsecurity.uark.edu 14

Page 15: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

The Rise of UHF Passive RFID

http://rfidsecurity.uark.edu 15

Page 16: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Massachusetts Institute of Technology

• Robotic vision (1998)• Vision of Electronic Product Code (EPC) for

every object

http://rfidsecurity.uark.edu 16

Page 17: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

http://rfidsecurity.uark.edu 17

Electronic Product Code (EPC) 96-bit Version

• Every product has unique identifier• 96 bits can uniquely label all products for the next 1,000 years• 2^96 = 79,228,162,514,264,337,593,543,950,336

Version EPC Manager (Manufacturer)

Object Class (Product)

Serial Number

8 bits 28 bits 24 bits 36 bits

Page 18: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Auto-ID Center• Formed in 1999• Participants

– MIT– Proctor and Gamble– UCC that administers barcodes for retail products

• Six major universities– Massachusetts Institute of Technology in Cambridge, Massachusetts– University of Cambridge in the U.K.– University of Adelaide in Australia– Keio University in Japan– Fugan University in China– University of St. Gallen in Switzerland

http://rfidsecurity.uark.edu 18

Page 19: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Auto-ID Center continued• Vision of ubiquitous RFID• Requirements

– Simple and inexpensive tags– Low-cost manufacturing– Standard infrastructure like DNS to locate information about a particular EPC

number– Savants were names for software agents to consolidate many queries of tags– 900 MHz chosen as best overall frequency based on cost, read range, and

capability• Wal-Mart joined in 2001 and proved to be important• Two startups in 2000-2002

– Matrics bought by Symbol Technologies bought by Motorola – Alien Technologies

http://rfidsecurity.uark.edu 19

Page 20: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

EPCglobal Inc. formed in 2003

• Auto-ID Center outgrew academic environment• Joint venture between EAN International and the

Uniform Code Council (UCC).– UCC standardized Universal Product Code (UPC)

barcodes in US– EAN standardized barcodes in Europe– UCC and EAN combined to form GS1

• Not-for-profit organization developing commercial, world-wide RFID standards

• http://www.epcglobalinc.org/

http://rfidsecurity.uark.edu 20

Page 21: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Two incompatible protocols!

• Class 0– Symbol Technologies– Impinj– Avery

• Class-1 Generation-1 (Class 1)– Alien Technologies– Avery– Rafsec

http://rfidsecurity.uark.edu 21

Page 22: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

UHF Class-1 Generation-2 protocol (Gen2)

• EPCglobal formed hardware action group (HAG) in 2004

• EPCglobal created Gen2 standard• Became IS0 18000-6C in 2006• Possibly the most important standard for

passive RFID tags

http://rfidsecurity.uark.edu 22

Page 23: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

EPCglobal Standards

• EPCglobal UHF Class-0 (Class0)• EPCglobal UHF Class-1 Generation-1 (Class1)• EPCglobal UHF Class-1 Generation-2 (Gen2)– ISO 18000-6C

http://rfidsecurity.uark.edu 23

Page 24: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

United States Department of Defense (DOD)

• Already used RFID in tracking shipping containers

• Mandated tagging of high-value cases by 2005

http://rfidsecurity.uark.edu 24

Page 25: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Wal-Mart

• RFID adds visibility as the items flow through the supply chain from the manufacturer, shippers, distributors, and retailers

• The added visibility can identify bottlenecks and save money

• Wal-Mart requested in June 2003 that their top 100 suppliers use RFID at the pallet and case level by January 2005

• Accelerated the introduction of RFID

http://rfidsecurity.uark.edu 25

Page 26: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Contact InformationDale R. Thompson, Ph.D., P.E.Associate ProfessorComputer Science and Computer Engineering Dept.JBHT – CSCE 5041 University of ArkansasFayetteville, Arkansas 72701-1201

Phone: +1 (479) 575-5090FAX: +1 (479) 575-5339E-mail: [email protected]: http://comp.uark.edu/~drt/

http://rfidsecurity.uark.edu 26

Page 27: Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas  1 This

Copyright Notice, Acknowledgment, and Liability Release

• Copyright Notice– This material is Copyright © 2008, 2009 by Dale R. Thompson. It may be freely redistributed in its

entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder.

• Acknowledgment– These materials were developed through a grant from the National Science Foundation at the

University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas.

• Liability Release– The curriculum activities and lessons have been designed to be safe and engaging learning

experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices.

http://rfidsecurity.uark.edu 27